On the Secrecy Performance of NOMA-Based Cognitive Radio Networks with STBC
LI Mei-ling1, TIAN Li-li1, YANG Xiao-xia1, LI Ying1, WANG An-hong1, DONG Zeng-shou1, Sami Muhaidat2, Mehrdad Dianati3
1. School of Electronic and Information Engineering, Taiyuan University of Science and Technology, Taiyuan, Shanxi 030024, China;
2. University of Khalifa, Abu Dhabi, The United Arab Emirates;
3. University of Warwick, England, UK
Abstract:The physical layer transmission faces the interference from primary users and eavesdroppers in cognitive radio networks based on non-orthogonal multiple access (CR-NOMA).In this paper,Alamouti space-time block coded (STBC) is utilized to improve the physical layer security transmission performance.The closed-form expressions for the security outage probability of all secondary users are derived.We provide extensive Monte-Carlo simulation results to corroborate the analysis.The results show that the security outage probability of stronger cognitive users is improved by the proposed STBC-NOMA-based CR compared with the traditional NOMA-based CR.Moreover,the security outage probability of the stronger cognitive users experiences performance enhancement with the increase of the cognitive transmission power,whilst the security outage probability of weaker cognitive users will be less impacted by the transmission power.In addition,we demonstrate that the power allocation coefficients will have different impact on the stronger cognitive users and the weaker users.
李美玲, 田莉莉, 杨晓霞, 李莹, 王安红, 董增寿, Sami Muhaidat, Mehrdad Dianati. 基于STBC的无线认知NOMA系统物理层安全性能研究[J]. 电子学报, 2020, 48(3): 463-469.
LI Mei-ling, TIAN Li-li, YANG Xiao-xia, LI Ying, WANG An-hong, DONG Zeng-shou, Sami Muhaidat, Mehrdad Dianati. On the Secrecy Performance of NOMA-Based Cognitive Radio Networks with STBC. Acta Electronica Sinica, 2020, 48(3): 463-469.
[1] Ding Z G,Liu Y W,Choi J H,et al.Application of non-orthogonal multiple access in LTE and 5G networks[J].IEEE Communications Magazine,2017,55(2):185-191.
[2] Yue X W,Qin Z J,Liu Y W,et al.A unified framework for non-orthogonal multiple access[J].IEEE Transactions on Communications,2018,66(11):5346-5359.
[3] Yue X W,Liu Y W,Kang S L,et al.Modeling and analysis of two-way relay non-orthogonal multiple access systems[J].IEEE Transactions on Communications,2018,66(09):3784-3796.
[4] Toka M,Kucur O.Non-orthogonal multiple access with alamouti space-time block coding[J].IEEE Communications Letters,2018,22(09):1954-1957.
[5] Kader M,Shin S Y.Cooperativerelaying using space-time block coded non-orthogonal multiple access[J].IEEE Transactions on Vehicular Technology,2017,66(07):5894-5903.
[6] Liu Y,Ding Z,Elkashlan M,et al.Non-orthogonal multiple access in large-scale underlay cognitive radio networks[J].IEEE Transactions on Vehicular Technology,2016,65(12):10152-10157.
[7] Lv L,Chen J,Ni Q.Cooperative non-orthogonal multiple access in cognitive radio[J].IEEE Communications Letters,2016,20(10):2059-2062.
[8] Feng Y,Yan S,Yang Z,et al.Beamforming design and power allocation for secure transmission with NOMA[J].IEEE Transactions on Communications,2019,18(05):2639-2651.
[9] F H Zhou,Z Chu and H J Sun et al.Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT[J].IEEE Journal on Selected Areas in Communications,2018,36(4):918-931.
[10] Zou Y,Wang G.Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack[J].IEEE Transactions on Industrial Informatics,2015,12(2):780-787.
[11] Lei H,Zhang J,Park K H,et al.On secure NOMA systems with transmit antenna selection schemes[J].IEEE Access,2017,5:17450-17464.